#1 Trending Cybersecurity News & Magazine
Wednesday, December 6, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Nget Stealer information stealer

    Nget Stealer Targets Cryptocurrency Wallets, Poses New Surface-Level Menace

    CISA

    CISA Warns of ColdFusion Vulnerability: Immediate Security Patching Required

    Henry Schein data breach

    Ransom Paid, Yet Struck Again: Henry Schein Hit by Third Cyberattack

    MAPC Cyberattack

    LockBit Claims Cyberattack on Metropolitan Area Planning Council, Sets December 8 Deadline

    cyberattacks on Israeli organizations

    Cyber Toufan Team Strikes Again: Israeli Organizations Allegedly Hit by Cyberattacks

    TraCS Florida cyberattack

    ALPHV/BlackCat Claims Cyberattack on TraCS Florida, Website Outage Raises Doubts

    Income Tax Department of India

    India’s Income Tax Department Data Breach: Threat Actor Sets Price for Access

    James Yoo

    The Man Behind the Arlington Explosion: Ex-Telecom Security Chief Suspected

    SPARRSO data breach

    Cyberattack on SPARRSO Raises Concerns Over Security in Bangladesh

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI Security Guidelines

    Rethinking AI For Cybersecurity: The UK & US Reveals New Guidelines For AI Security

    Cyber Insurance

    Cyber Insurance and Real-Time Threat Dashboard to Mend the Gaps in Near Future

    Pledge to Stop Ransom Payment

    Pledge to Stop Ransom Payment Awaits Consensus from all Members of the CRI

    Executive Order on Artificial Intelligence

    Biden Administration’s AI Directive: A Blueprint for Ethical Use and Enhanced Cybersecurity

    Cyber Resilience

    Towards Cyber Resilience: A Data-Centric Approach to Security

    CybleGrowCon

    Cyble Partner Network GrowCon 2023: Uniting Cybersecurity Leaders

    GRC, What is GRC

    What is GRC (Governance, Risk & Compliance): A Beginner’s Guide

    Facial Recognition Ban

    New York State Education Department Bans Facial Recognition Scans in Schools

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    InsureMO

    InsureMO Partners with Cyble to Revolutionize Cyber Insurance with Real-Time Threat Intelligence

    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Nget Stealer information stealer

    Nget Stealer Targets Cryptocurrency Wallets, Poses New Surface-Level Menace

    CISA

    CISA Warns of ColdFusion Vulnerability: Immediate Security Patching Required

    Henry Schein data breach

    Ransom Paid, Yet Struck Again: Henry Schein Hit by Third Cyberattack

    MAPC Cyberattack

    LockBit Claims Cyberattack on Metropolitan Area Planning Council, Sets December 8 Deadline

    cyberattacks on Israeli organizations

    Cyber Toufan Team Strikes Again: Israeli Organizations Allegedly Hit by Cyberattacks

    TraCS Florida cyberattack

    ALPHV/BlackCat Claims Cyberattack on TraCS Florida, Website Outage Raises Doubts

    Income Tax Department of India

    India’s Income Tax Department Data Breach: Threat Actor Sets Price for Access

    James Yoo

    The Man Behind the Arlington Explosion: Ex-Telecom Security Chief Suspected

    SPARRSO data breach

    Cyberattack on SPARRSO Raises Concerns Over Security in Bangladesh

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI Security Guidelines

    Rethinking AI For Cybersecurity: The UK & US Reveals New Guidelines For AI Security

    Cyber Insurance

    Cyber Insurance and Real-Time Threat Dashboard to Mend the Gaps in Near Future

    Pledge to Stop Ransom Payment

    Pledge to Stop Ransom Payment Awaits Consensus from all Members of the CRI

    Executive Order on Artificial Intelligence

    Biden Administration’s AI Directive: A Blueprint for Ethical Use and Enhanced Cybersecurity

    Cyber Resilience

    Towards Cyber Resilience: A Data-Centric Approach to Security

    CybleGrowCon

    Cyble Partner Network GrowCon 2023: Uniting Cybersecurity Leaders

    GRC, What is GRC

    What is GRC (Governance, Risk & Compliance): A Beginner’s Guide

    Facial Recognition Ban

    New York State Education Department Bans Facial Recognition Scans in Schools

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    InsureMO

    InsureMO Partners with Cyble to Revolutionize Cyber Insurance with Real-Time Threat Intelligence

    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Main Story

John Hammond talks about his journey in cybersecurity

Augustin Kurian by Augustin Kurian
October 20, 2022 - Updated on February 27, 2023
in Main Story
0
John Hammond talks about his journey in cybersecurity
670
SHARES
3.7k
VIEWS
Share on LinkedInShare on Twitter

John Hammond doesn’t really need an introduction, he is one of the most famous cybersecurity researchers, educators, and content creators. As part of the Threat Operations team at Huntress, John spends his days making hackers earn their access and helping tell the story. Previously, as a Department of Defense Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages, and the adversarial mindset.

He has developed training material and information security challenges for events such as PicoCTF and competitions at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the US Naval Academy, and other online events including the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, CTF video walkthroughs, and other cyber security content.

You might also like

Dark Web’s Black Market: Where Stolen Identities Find Their Secret Price Tag

Artificial Intelligence: The Bridge Between Utopia and Dystopia

‘Pig Butchering’ Scheme: A Tried and Tested Scam Targeting Crypto

John currently holds the following certifications: Security+, CEH, LFS, eJPT, eCPPT, PNPT, PCAP, OSWP, OSCP, OSCE, OSWE, OSEP, and OSED (OSCE(3)).

In an interaction with Augustin Kurian, the Editor in Chief of The Cyber Express, John talks about his journey as a cybersecurity content creator on YouTube, newer trends in cybersecurity news and some new threat actors in the space, and more importantly, some nice tips on password hygiene.

Here is a brief excerpt from the interview.

Augustin Kurian: Tell us a bit about your journey, figuring out that cybersecurity is the place you want to be, starting at your own gig and then coming up with a YouTube channel, and doing incredibly well there in that space, I think you should be proud of producing one of the best cybersecurity contents on YouTube. So, how did it all begin?

John Hammond: I guess I got started, probably in the whole technology computer sphere when I was a lot younger—I think eight or nine. I was thinking, I want to make video games, or I want to be a hacker like I have seen in the movies. That looks very cool. And because computers are interesting. And they look like they’re fun. And I liked that you could do so much creative stuff. I asked my father if I could learn how to make a website.

So, he taught me HTML and CSS and the beginnings of JavaScript and stuff like that. And then he said, well, if you want to start a website, you need to have a server, you need to be able to host it on something. So, he got me this machine, a box that’s run like Turbolinux old school distribution. And he said, all right, well, let’s learn how to use Apache and Nginx. And let’s create all this. So, for that longest time, it was in the building mentality of like, let’s write software. Let’s create stuff.

It wasn’t until I got into my undergrad, or college that I went. I went to one of the military academies in the United States, the Coast Guard Academy, and they care much more about the security of applications that you create, right? It’s cool that you made this thing, but is it battle-tested? Is it safe? Is it sturdy? Can it be beaten up? So, that introduced me to vulnerabilities and exploits and CVE is in that whole wide world of cybersecurity. And I thought this is really interesting. You know, this is kind of fulfilling, where you have sort of a good versus evil mentality in defending against adversaries. So, it just felt like, man, this is fascinating. And I’m happy to be a part of it.

Augustin Kurian: So, how did the YouTube thing happen?

John Hammond: It’s funny because the way that I was learning way back was through Googling. I was looking online and watching videos on YouTube on how to code a program and work through tutorials. And I thought that might be how a lot of people learn. I’ve heard people say the best way to become a master of something or to get better at it is to try to teach it to others. So, I thought, I can make some silly videos and showcase what I’m learning. For the longest time, if you look back, you can even find videos from like 2009 or 2011, like a decade ago on my channel, but it’s slow growth. I never expected it to become what it is today. But it’s very fulfilling and super sweet to see it has grown and blossomed and turned into something of its own.

The full version of the interview can be found at the beginning of the article.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: cyber expresscyber express newscybersecurityJohn HammondJohn Hammond CybersecurityJohn Hammond YoutubemalwareRansomware
Previous Post

Scammers Duplicate QR Codes, Sell Them to Multiple Users

Next Post

Django Reports DoS Vulnerability, Releases Security Updates

Augustin Kurian

Augustin Kurian

Augustin Kurian is the Editor-In-Chief of The Cyber Express, an information security publication catering to an audience encompassing CISOs, CXOs, network engineers, technology enthusiasts, security professionals, and students. In his role, he leads the editorial division, manages outreach campaigns, promotes diversity in technology, and establishing best cybersecurity practices.

Related Posts

Dark Web Marketplace
Firewall Daily

Dark Web’s Black Market: Where Stolen Identities Find Their Secret Price Tag

by Ashish Khaitan
October 28, 2023
Artificial Intelligence
Firewall Daily

Artificial Intelligence: The Bridge Between Utopia and Dystopia

by Editorial
February 2, 2023 - Updated on May 26, 2023
Pig Butchering
Firewall Daily

‘Pig Butchering’ Scheme: A Tried and Tested Scam Targeting Crypto

by Editorial
November 22, 2022
Nok Air
Firewall Daily

ALPHV Ransomware Group Lists Thailand’s Nok Air Airline as Victim 

by Editorial
November 21, 2022 - Updated on June 26, 2023
Discord
Firewall Daily

CNIL Sanctions Discord 800,000 Euros for Violating GDPR Policies

by Editorial
November 21, 2022
Next Post
Django Vulnerability

Django Reports DoS Vulnerability, Releases Security Updates

Latest Issue is Out. Subscribe Now

Cybersecurity Magazine



Follow Us On Google News

Latest Cyber News

Nget Stealer information stealer
Dark Web News

Nget Stealer Targets Cryptocurrency Wallets, Poses New Surface-Level Menace

December 6, 2023
CISA
Cybersecurity News

CISA Warns of ColdFusion Vulnerability: Immediate Security Patching Required

December 6, 2023
Henry Schein data breach
Firewall Daily

Ransom Paid, Yet Struck Again: Henry Schein Hit by Third Cyberattack

December 6, 2023
MAPC Cyberattack
Firewall Daily

LockBit Claims Cyberattack on Metropolitan Area Planning Council, Sets December 8 Deadline

December 6, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance